|
@@ -1343,8 +1343,7 @@ tor_tls_got_client_hello(tor_tls_t *tls)
|
|
|
|
|
|
if (tor_run_in_libevent_loop(tls->excess_renegotiations_callback,
|
|
|
tls->callback_arg) < 0) {
|
|
|
- log_warn(LD_GENERAL, "Didn't manage to set a renegotiation "
|
|
|
- "limiting callback.");
|
|
|
+ log_warn(LD_GENERAL, "Didn't manage to set a renegotiation limiting callback.");
|
|
|
}
|
|
|
}
|
|
|
|
|
@@ -1399,6 +1398,7 @@ tor_tls_state_changed_callback(const SSL *ssl, int type, int val)
|
|
|
tor_tls_got_client_hello(tls);
|
|
|
}
|
|
|
#endif
|
|
|
+
|
|
|
}
|
|
|
|
|
|
/** Replace *<b>ciphers</b> with a new list of SSL ciphersuites: specifically,
|
|
@@ -1666,8 +1666,8 @@ tor_tls_read(tor_tls_t *tls, char *cp, size_t len)
|
|
|
#ifdef V2_HANDSHAKE_SERVER
|
|
|
if (tls->got_renegotiate) {
|
|
|
if (tls->server_handshake_count != 2) {
|
|
|
- log_warn(LD_BUG, "We did not notice renegotiation in a timely "
|
|
|
- "fashion (%u)!", tls->server_handshake_count);
|
|
|
+ log_warn(LD_BUG, "We did not notice renegotiation in a timely fashion (%u)!",
|
|
|
+ tls->server_handshake_count);
|
|
|
}
|
|
|
|
|
|
/* Renegotiation happened! */
|